Sciweavers

318 search results - page 28 / 64
» Enforcing Trust in Pervasive Computing with Trusted Computin...
Sort
View
WWW
2005
ACM
14 years 9 months ago
Guidelines for developing trust in health websites
How do people decide which health websites to trust and which to reject? Thirteen participants all diagnosed with hypertension were invited to search for information and advice re...
Elizabeth Sillence, Pamela Briggs, Lesley Fishwick...
VOTEID
2007
Springer
14 years 2 months ago
Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator
It is debatable if current direct-recording electronic voting machines can sufficiently be trusted for a use in elections. Reports about malfunctions and possible ways of manipulat...
Jens-Matthias Bohli, Jörn Müller-Quade, ...
PERCOM
2010
ACM
13 years 7 months ago
ReSCo: A middleware component for Reliable Service Composition in pervasive systems
Abstract—Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as th...
Brent Lagesse, Mohan Kumar, Matthew Wright
MOBISYS
2007
ACM
14 years 8 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
EKAW
2010
Springer
13 years 7 months ago
Extending Open Rating Systems for Ontology Ranking and Reuse
Abstract. Ontology reuse saves costs and improves interoperability between ontologies. Knowing which ontology to reuse is difficult without having a quality assessment. We employ u...
Holger Lewen, Mathieu d'Aquin